CSLtraining MikroTik Class 2
CSLtraining MikroTik Class 2
CSLtraining MikroTik Class 2
(Exam Outline)
Effective Date: January 1, 2015
1
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Impartiality Statement
(ISC) is committed to impartiality by promoting a bias and discrimination free environment for
all members, candidates, staff, volunteers, subcontractors, vendors, and clients. (ISC)s board
of directors, management and staff understand the importance of impartiality in carrying out its
certification activities, manage conflict of interest and ensure the objectivity of its certification.
If you feel you have not received impartial treatment, please send an email to [email protected]
or call +1.727.785.0189, so that we can investigate your claim.
Non-Discrimination Policy
(ISC) is an equal opportunity employer and does not allow, condone or support discrimination
of any type within its organization including, but not limited to, its activities, programs, practices,
procedures, or vendor relationships. This policy applies to (ISC) employees, members,
candidates, and supporters.
Whether participating in an (ISC) official event or certification examination as an employee,
candidate, member, staff, volunteer, subcontractor, vendor, or client if you feel you have been
discriminated against based on nationality, religion, sexual orientation, race, gender, disability,
age, marital status or military status, please send an email to [email protected] or call
+1.727.785.0189, so that we can investigate your claim.
For any questions related to these polices, please contact the (ISC) Legal Department
at [email protected].
2
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
1)
Security and Risk Management (e.g., Security, Risk, Compliance, Law, Regulations,
Business Continuity) .................................................................................................................................7
Overview ...................................................................................................................................................7
Key Areas of Knowledge ........................................................................................................................8
2)
Overview ................................................................................................................................................ 11
Key Areas of Knowledge ..................................................................................................................... 12
3)
Overview ................................................................................................................................................ 13
Key Areas of Knowledge ..................................................................................................................... 14
4)
Communication and Network Security (Designing and Protecting Network Security) ... 16
Overview ................................................................................................................................................ 16
Key Areas of Knowledge ..................................................................................................................... 16
5)
Identity and Access Management (Controlling Access and Managing Identity) .......... 18
Overview ................................................................................................................................................ 18
Key Areas of Knowledge ..................................................................................................................... 18
6)
Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) .
...................................................................................................................................................... 20
Overview ................................................................................................................................................ 20
Key Areas of Knowledge ..................................................................................................................... 21
7)
Security Operations (e.g., Foundational Concepts, Investigations, Incident
Management, Disaster Recovery)..................................................................................................... 22
Overview ................................................................................................................................................ 22
Key Areas of Knowledge ..................................................................................................................... 23
8)
Software Development Security (Understanding, Applying, and Enforcing Software
Security) ................................................................................................................................................. 27
Overview ................................................................................................................................................ 27
Key Areas of Knowledge ..................................................................................................................... 27
REFERENCES........................................................................................................................................... 29
3
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
4
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
The Certified Information Systems Security Professional (CISSP) is an ISO/IEC 17024 ANSI
accredited, internationally recognized benchmark information security certification designed
for information security professionals with five or more years of experience in the field. The CISSP
examination measures the competence of candidates against an internationally accepted
common body of knowledge encompassing eight (8) security domains which include Security
and Risk Management, Asset Security, Security Engineering, Communication and Network
Security, Identity and Access Management, Security Assessment and Testing, Security
Operations, and Software Development Security.
The eight (8) domains of the (ISC) CISSP CBK provide a vendor neutral and internationally
understood common framework upon which the practice of information security can be
discussed, taught and otherwise advanced across geographic and geopolitical boundaries.
The broad spectrum of topics included in the CISSP CBK ensure its relevancy across all
disciplines in the field of information security and the high level of detail provided in each
domain ensures that credential holders possess the depth of skills and knowledge expected of
a seasoned security professional. (ISC)s CISSP credential holders may further elevate their
standing through one of the CISSP concentrations in management, architecture or engineering.
They can also deepen their knowledge beyond the CISSP by coupling credentials such as
Digital Forensics (CCFP), Software Development (CSSLP), System Authorization (CAP), and/or
the Certified Cloud Security Professional (CCSP).
This Candidate Information Bulletin includes;
an exam blueprint that outlines major topics and sub- topics within the eight (8) domains,
In order to be considered for the CISSP credential, candidates are required to have a
minimum of five (5) years of cumulative paid full-time security professional work experience in
two or more of the eight domains of the (ISC) CISSP CBK. Candidates who presently hold an
active certification that appears on the (ISC) approved list (visit www.isc2.org/credential
waiver for a complete list) may receive a one year experience waiver. Alternatively, a fouryear Baccalaureate degree, or the regional equivalent, may be substituted for one year of
experience. No more than 1 year of total experience may be waived.
5
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Candidates must also respond to the following four (4) questions regarding criminal history and
related background information and provide an explanation for any questions answered in the
affirmative (any such explanations will be evaluated during the endorsement process).
1. Have you ever been convicted of a felony; a misdemeanor involving a computer crime,
dishonesty, or repeat offenses; or a Court Martial in military service, or is there a felony
charge, indictment, or information now pending against you? (Omit minor traffic
violations and offenses prosecuted in juvenile court).
2. Have you ever had a professional license, certification, membership or registration
revoked, or have you ever been censured or disciplined by any professional organization
or government agency?
3. Have you ever been involved, or publicly identified, with criminal hackers or hacking?
4. Have you ever been known by any other name, alias, or pseudonym? (You need not
include user identities or screen names with which you were publicly identified).
CISSP Candidates must also attest to the truth of their assertions regarding professional
experience, and legally commit to abide by the (ISC) Code of Ethics (Section 3).
6
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
7
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
B.2
B.3
B.4
Control frameworks
B.5
Due care
B.6
Due diligence
C. Compliance
C.1
C.2
Computer crimes
D.2
D.3
Import/export controls
D.4
D.5
Privacy
D.6
Data breaches
8
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
E.2
G.2
I.
H.1
H.2
H.3
H.4
H.5
Compliance
H.6
Privacy
I.2
I.3
I.4
Countermeasure selection
I.5
Implementation
I.6
I.7
Control assessment
I.8
I.9
Asset valuation
I.10
Reporting
I.11
Continuous improvement
9
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
I.12
Risk frameworks
J.2
J.3
J.4
K.
K.1
K.2
K.3
K.4
Service-level requirements
L.2
10
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
2)
Overview
Asset Security, within the context of the second domain of the (ISC) CISSP examination,
addresses the collection, handling and protection of information throughout its lifecycle. The
classification of information and supporting assets forms the basis for all covered topics within
this domain and candidates are expected to be well versed in this area. Ownership, as it
relates to information, systems, and business processes, goes hand in hand with classification
and is the second covered topic in the asset security domain.
The rapid expansion in the collection and storage of digitized personal information has resulted
in a corresponding increase in the importance of privacy considerations, and privacy
protection constitutes an important part of the asset security domain. Individual privacy
protection topics covered on the CISSP examination include the concepts of data owners,
data processors, data remanence, and limitations on collection and storage. Any discussion
regarding the collection and storage of information must include data retention. Retention
must be considered in light of organizational, legal and regulatory requirements and
candidates will be tested on each.
Having considered all factors discussed above, the responsibility for the selection of appropriate
data security controls then falls upon the information security professional, and CISSP
candidates will be tested on this area in some detail. Covered topics in this area include
baselines, scoping and tailoring, standards selection and cryptography.
The final topic in the asset security domain addresses data handling requirements and includes
data storage, labeling and destruction. CISSP candidates are expected to be capable of
evaluating data handling requirements and of developing appropriate policies and
procedures based on that evaluation.
11
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Data owners
C.2
Data processers
C.3
Data remanence
C.4
Collection limitation
Baselines
E.2
E.3
Standards selection
E.4
Cryptography
12
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
13
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
E.2
E.3
E.4
E.5
E.6
Cryptographic systems
E.7
I.2
I.3
I.4
I.5
Digital signatures
14
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
I.6
I.7
Non-repudiation
I.8
I.9
J.
K.
Wiring closets
K.2
Server rooms
K.3
K.4
Evidence storage
K.5
K.6
K.7
K.8
K.9
15
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
A.2
IP networking
A.3
A.4
A.5
Software-defined networks
A.6
Wireless networks
A.7
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
B.2
B.3
B.4
Endpoint security
B.5
Content-distribution networks
B.6
Physical devices
Voice
C.2
C.3
C.4
C.5
Virtualized networks (e.g., SDN, virtual SAN, guest operating systems, port
isolation)
17
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Information
A.2
Systems
A.3
Devices
A.4
Facilities
B.2
B.3
Accountability
B.4
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
B.5
B.6
B.7
E.2
E.3
E.4
19
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
20
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Vulnerability assessment
B.2
Penetration testing
B.3
Log reviews
B.4
Synthetic transactions
B.5
B.6
B.7
B.8
C.2
Management review
C.3
C.4
C.5
C.6
21
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
22
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
A.2
A.3
A.4
Operational
B.2
Criminal
B.3
Civil
B.4
Regulatory
B.5
C.2
C.3
Continuous monitoring
C.4
23
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
D.2
Configuration management
D.3
Physical assets
D.4
D.5
D.6
E.2
E.3
E.4
Job rotation
E.5
Information lifecycle
E.6
Service-level agreements
Media management
F.2
Detection
G.2
Response
G.3
Mitigation
G.4
Reporting
G.5
Recovery
G.6
Remediation
G.7
Lessons learned
24
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Firewalls
H.2
H.3
Whitelisting/Blacklisting
H.4
H.5
Sandboxing
H.6
Honeypots/Honeynets
H.7
Anti-malware
K.2
K.3
K.4
Response
L.2
Personnel
L.3
Communications
L.4
Assessment
L.5
Restoration
L.6
Read-through
M.2
Walkthrough
25
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
M.3
Simulation
M.4
Parallel
M.5
Full interruption
O.2
26
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
A.2
Maturity models
A.3
A.4
Change management
A.5
27
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
B.3
B.4
B.5
C.2
C.3
Acceptance testing
28
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
REFERENCES
The CISSP exam is based on a common body of knowledge that is recognized internationally
and the exam content is based on a job task analysis conducted as recommended by
ISO/IEC/ANSI 17024 standards. Questions included in the examination are developed by item
writers who are subject matter experts in the field from information gained through their
practical experience. Such information is validated against reference materials including
(ISC)s own common body of knowledge, textbooks, articles, standards and regulations. The
following supplemental reference list is not intended to be all inclusive and (ISC) makes no
assertion that the use of this list or knowledge of the subject matter within will result in the
successful completion of the examination. Nor does (ISC) endorse any particular text or
author. Candidates are encouraged to supplement their education and experience by
reviewing relevant resources that pertain to the common body of knowledge and finding
information for areas in which they find themselves to be deficient.
Domain
Supplementary Reference
(ISC), Code of Ethics (https://www.isc2.org/ethics/default.aspx)
Bacik, S., (2008). Building an Effective Information Security Policy
Architecture
Bowman, R.H., (2008). Business Continuity Planning for Data Centers and
Systems: A Strategic Implementation Guide
Brotby, K., (2010). Information Security Governance
Calder, A., S. Watkins, (2012). IT Governance: A Manager's Guide to
Data Security and ISO 27001/ISO 27002, (5th Edition)
Ermann, M.D., M.S. Shauf, (2002). Computers, Ethics, and Society, (3RD
Edition)
Garner, B.A., (2009). Black's Law Dictionary,( 9th edition)
Hayden, L., (2010). IT Security Metrics: A Practical Framework for
Measuring Security & Protecting Data
Herold, R., (2010). Managing an Information Security and Privacy
Awareness and Training Program, (2nd Edition)
Hiles, A., P. Barnes, (2010). The Definitive Handbook of Business
Continuity Management, (3rd Edition)
Jaquith, A., (2007). Security Metrics: Replacing Fear, Uncertainty, and
Doubt
Kuner, C., (2007). European Data Protection Law: Corporate Regulation
and Compliance
Landoll, D.J., (2011). The Security Risk Assessment Handbook: A
Complete Guide for Performing Security Risk Assessments, (2nd Edition)
29
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Asset Security
(Protecting Security of
Assets)
Security Engineering
(Engineering and
Management of
Security)
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Security Operations
(e.g., Foundational
Concepts,
Investigations, Incident
Management, Disaster
Recovery)
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Software Development
Security (Understanding,
Applying, and Enforcing
Software Security)
33
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
34
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Which one of the following is the MOST important security consideration when selecting a
new computer facility?
(A)
(B)
(C)
(D)
Utility infrastructure
Answer - D
2.
(A)
(B)
(C)
(D)
Answer - B
3.
(A)
(B)
(C)
(D)
Answer - C
35
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Fees
Please visit the (ISC) website https://www.isc2.org/certification-register-now.aspx for the most
current examination registration fees.
36
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
CBT Demonstration
Candidates can experience a demonstration and tutorial of the CBT experience
on our Pearson VUE web page. The tutorial may be found at
www.pearsonvue.com/isc2 .
37
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
PLEASE NOTE: Candidates that request special accommodations should not schedule their
appointment online or call the main CBT registration line.
39
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Non Disclosure
Prior to starting the exam, all candidates are presented with (ISC) non-disclosure agreement
(NDA), and are required in the computer to accept the agreement prior to being presented
with exam questions. If the NDA is not accepted by the candidate, or refused to accept within
the time allotted, the exam will end, and the candidate will be asked to leave the test center.
No refund of exam fees will be given. For this reason, all candidates are strongly encouraged to
review the non-disclosure agreement prior to scheduling for, or taking the exam.
The agreement is located at www.pearsonvue.com/isc2/isc2_nda.pdf.
40
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
The Test Administrator (TA) will give you a short orientation, and then will escort you to
a computer terminal. You must remain in your seat during the examination, except
when authorized to leave by test center staff. You may not change your computer
terminal unless a TA directs you to do so.
Breaks
You will have up to six hours to complete the CISSP, and up to four hours to complete the CSSLP
and CCFP up to three hours to complete the following examinations:
SSCP
CAP
HCISPP
ISSAP
ISSEP
ISSMP
Total examination time includes any unscheduled breaks you may take. All breaks count
against your testing time. You must leave the testing room during your break, but you may not
leave the building or access any personal belongings unless absolutely necessary (e.g. for
retrieving medication). Additionally, when you take a break, you will be required to submit to a
palm vein scan before and after your break.
The CISSP examination consists of 250 multiple choice questions with four (4) choices
each.
The CSSLP examination consists of 175 multiple choice questions with four (4) choices
each.
The HCISPP examination contains 125 multiple choice questions with four (4) choices
each.
The CCFP examination contains 125 multiple choice questions with four (4) choices each.
The SSCP examination contains 125 multiple choice questions with four (4) choices
each.
41
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
The ISSAP, ISSEP, and ISSMP concentration examinations contain 125, 150, 125
multiple choice questions respectively with four (4) choices each.
The Certified Authorization Professional (CAP) examination contains 125 multiple choice
questions with four (4) choices each. Also, administered in computers.
There may be scenario-based items which may have more than one multiple choice
question associated with it. These items will be specifically identified in the test booklet.
Each of these exams contains 25 questions which are included for research purposes only.
The research questions are not identified; therefore, answer all questions to the best of your
ability. There is no penalty for guessing, so candidates should not leave any item unanswered.
Examination results will be based only on the scored questions on the examination. There
are several versions of the examination. It is important that each candidate have an
equal opportunity to pass the examination, no matter which version is administered. Subject
Matter Experts (SMEs) have provided input as to the difficulty level of all questions used in the
examinations. That information is used to develop examination forms that have comparable
difficulty levels. When there are differences in the examination difficulty, a mathematical
procedure called equating is used to make the difficulty level of each test form equal.
Because the number of questions required to pass the examination may be different for each
version, the scores are converted onto a reporting scale to ensure a common standard. The
passing grade required is a scale score of 700 out of a possible 1000 points on the grading
scale
Technical Issues
On rare occasions, technical problems may require rescheduling of a candidates examination.
If circumstances arise causing you to wait more than 30 minutes after your scheduled
appointment time, or a restart delay lasts longer than 30 minutes, you will be given the choice
of continuing to wait, or rescheduling your appointment without an additional fee.
If you choose to wait, but later change your mind at any time prior to beginning or
restarting the examination, you will be allowed to take exam at a later date, at
no additional cost.
If you choose not to reschedule, but rather test after a delay, you will have no
further recourse, and your test results will be considered valid.
If you choose to reschedule your appointment, or the problem causing the delay
cannot be resolved, you will be allowed to test at a later date at no additional
charge. Every attempt will be made to contact candidates if technical problems
are identified prior to a scheduled appointment.
42
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Testing Environment
Pearson Professional Centers administer many types of examinations including some that
require written responses (essay-type). Pearson Professional Centers have no control over typing
noises made by candidates sitting next to you while writing their examination. Typing noise is
considered a normal part of the computerized testing environment, just as the noise of turning
pages is a normal part of the paper-and pencil testing environment. Earplugs are available
upon request.
Results Reporting
Candidates will receive their unofficial test result at the test center. The results will be handed
out by the Test Administrator during the checkout process. (ISC) will then follow up with an
official result via email. All test results are subject to (ISC)s psychometric and forensic
evaluation. Based on the number of tests administered, this evaluation may be conducted
after candidates receive the official results email. Any candidate whose score is affected by
the psychometric and forensic evaluation will be notified by (ISC).
In some instances, real time results may not be available. A comprehensive statistical and
psychometric analysis of the score data is conducted during every testing cycle before scores
are released. A minimum number of candidates are required to take the exam before this
analysis can be completed. Depending upon the volume of test takers for a given cycle, there
may be occasions when scores are delayed for approximately 6-8 weeks in order to complete
this critical process. Results WILL NOT be released over the phone. They will be sent via email
from (ISC) as soon as the scores are finalized. If you have any questions regarding this policy,
you should contact (ISC) prior to your examination.
43
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Retake Policy
Test takers who do not pass the exam the first time will be able to retest after 30 days. Test
takers that fail a second time will need to wait 90 days prior to sitting for the exam again. In the
unfortunate event that a candidate fails a third time, the next available time to sit for the exam
will be 180 days after the most recent exam attempt. Candidates are eligible to sit for (ISC)
exams a maximum of 3 times within a calendar year.
44
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
Recertification by Examination
Candidates and members may recertify by examination for the following reasons ONLY;
The candidate has become decertified due to reaching the expiration of the time limit
for endorsement.
The member has become decertified for not meeting the number of required continuing
professional education credits.
Any questions?
(ISC) Candidate Services
311 Park Place Blvd, Suite 400
Clearwater, FL 33759
Phone: 1.866.331.ISC2 (4722) in the United States
1.727.785.0189 all others
Fax: 1.727.683.0785
45
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15
46
2015 International Information Systems Security Certification Consortium, Inc. All Rights Reserved. Duplication for commercial
purposes is prohibited. Revised 8.18.15, V15